Sciweavers

1266 search results - page 231 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
IPTPS
2005
Springer
14 years 1 months ago
Clustering in P2P Exchanges and Consequences on Performances
— We propose here an analysis of a rich dataset which gives an exhaustive and dynamic view of the exchanges processed in a running eDonkey system. We focus on correlation in term...
Stevens Le-Blond, Jean-Loup Guillaume, Matthieu La...
ICDCS
2009
IEEE
13 years 6 months ago
Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing
In recent years, there are substantial demands to reduce packet loss in the Internet. Among the schemes proposed, finding backup paths in advance is considered to be an effective ...
Meijia Hou, Dan Wang, Mingwei Xu, Jiahai Yang
ICPADS
2006
IEEE
14 years 2 months ago
Critical Path and Area Based Scheduling of Parallel Task Graphs on Heterogeneous Platforms
While most parallel task graphs scheduling research has been done in the context of single homogeneous clusters, heterogeneous platforms have become prevalent and are extremely at...
Tchimou N'Takpé, Frédéric Sut...
SIGGRAPH
1995
ACM
13 years 12 months ago
Applications of irradiance tensors to the simulation of non-Lambertian phenomena
We present new techniques for computing illumination from non-diffuse luminaires and scattering from non-diffuse surfaces. The methods are based on new closed-form expressions d...
James Arvo
FLAIRS
2004
13 years 9 months ago
Intelligent Control of Closed-Loop Sedation in Simulated ICU Patients
The intensive care unit is a challenging environment to both patient and caregiver. Continued shortages in staffing, principally in nursing, increase risk to patient and healthcar...
Brett L. Moore, Eric D. Sinzinger, Todd M. Quasny,...